Computer-Science-A-level-Ocr
-
3-3-networks8 主题
-
3-2-databases7 主题
-
3-1-compression-encryption-and-hashing4 主题
-
2-5-object-oriented-languages7 主题
-
2-4-types-of-programming-language4 主题
-
2-3-software-development5 主题
-
2-2-applications-generation6 主题
-
2-1-systems-software8 主题
-
1-3-input-output-and-storage2 主题
-
1-2-types-of-processor3 主题
-
1-1-structure-and-function-of-the-processor1 主题
-
structuring-your-responses3 主题
-
the-exam-papers2 主题
-
8-2-algorithms-for-the-main-data-structures4 主题
-
8-1-algorithms10 主题
-
7-2-computational-methods11 主题
-
7-1-programming-techniques14 主题
-
capturing-selecting-managing-and-exchanging-data
-
entity-relationship-diagrams
-
data-normalisation
-
relational-databases
-
hashing
-
symmetric-vs-asymmetric-encryption
-
run-length-encoding-and-dictionary-coding
-
lossy-and-lossless-compression
-
polymorphism-oop
-
encapsulation-oop
-
inheritance-oop
-
attributes-oop
-
methods-oop
-
objects-oop
-
capturing-selecting-managing-and-exchanging-data
-
6-5-thinking-concurrently2 主题
-
6-4-thinking-logically2 主题
-
6-3-thinking-procedurally3 主题
-
6-2-thinking-ahead1 主题
-
6-1-thinking-abstractly3 主题
-
5-2-moral-and-ethical-issues9 主题
-
5-1-computing-related-legislation4 主题
-
4-3-boolean-algebra5 主题
-
4-2-data-structures10 主题
-
4-1-data-types9 主题
-
3-4-web-technologies16 主题
-
environmental-effects
-
automated-decision-making
-
computers-in-the-workforce
-
layout-colour-paradigms-and-character-sets
-
piracy-and-offensive-communications
-
analysing-personal-information
-
monitoring-behaviour
-
censorship-and-the-internet
-
artificial-intelligence
-
the-regulation-of-investigatory-powers-act-2000
-
the-copyright-design-and-patents-act-1988
-
the-computer-misuse-act-1990
-
the-data-protection-act-1998
-
adder-circuits
-
flip-flop-circuits
-
simplifying-boolean-algebra
-
environmental-effects
client-server-and-peer-to-peer
Client-Server
What is a client-server network?
-
Powerful and reliable ‘server’ computers control the network and ‘serve’ the clients with services such as files, email, web access, etc.
-
Clients connect to the servers to access network services
-
In this setup, the server hosts, delivers and manages most of the resources and services to be consumed by the clients
|
Benefits |
Drawbacks |
|---|---|
|
Easier central management |
Single point of failure – if the server goes down, services could be unavailable |
|
Scalability: new clients can be added easily |
It can be expensive to set up and maintain – often need dedicated teams of people to maintain them |
|
Higher reliability as resources are managed centrally |
|
-
Use case: larger organisations where centralised control is needed, and reliability and security are paramount

Client computers connected to different servers
When to use a client-server network
-
The choice between client-server and peer-to-peer depends on the specific needs and resources of the network in question
-
Security, cost, ease of setup, and maintenance requirements should be considered
Peer-to-Peer
What is a peer-to-peer network?
-
This is the simplest type of network
-
In this setup, all computers in the network share equal responsibility, and there is no central server
-
All machines have equal status
-
Each machine is the responsibility of that machine’s user in terms of security, backup, etc.
-
Data is often spread around the network, with each user being responsible for their data
|
Benefits |
Drawbacks |
|---|---|
|
Easy to set up and less expensive than client-server as no administrative staff are needed |
Lack of central control can lead to security issues and vulnerabilities |
|
No dependency on a central server |
Not suitable for large networks as it can have performance issues |
|
Data can be shared directly between systems without the need for a central server |
|
-
Use cases: home networks, small businesses, or for specific applications like file sharing

Peer to peer network example setup
Responses